ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Jin Seung Hun Principal Researcher
Department
AI Data Security Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Conference
2025 The Advent of the AI Era and the Future of Digital Identity   진승헌   한국정보기술학회 종합 학술 대회 (추계) 2025, pp.170-174
Conference
2025 A Study on the Integration of Passwordless Authentication in Zero Trust Architecture (ZTA) Environments   진승헌   한국정보보호학회 학술 대회 (하계) 2025, pp.677-680
Journal
2025 The Evolution of Authentication and its Paradigm Transformation   진승헌   정보와 통신: 한국통신학회지, v.46, no.7, pp.53-61
Journal
2024 Cybersecurity Technology in the Age of AI   진승헌   주간기술동향, v.2160, pp.2-16
Conference
2024 An Integrated Perspective on the Definition of AI Security   진승헌   한국정보기술학회 종합 학술 대회 (추계) 2024, pp.123-126
Conference
2024 A Study on Mapping Digital Identities between EU and US   진승헌   한국정보기술학회 종합 학술 대회 (하계) 2024, pp.91-95
Journal
2024 EU eIDAS 2.0 & European Digital Identity Wallet   진승헌   TTA Journal, v.211, pp.90-95
Conference
2023 Evolution of digital wallets and consideration of security threats   진승헌   한국정보보호학회 학술 대회 (하계) 2023, pp.1-4
Journal
2022 Review for ID management technology according to Metaverse phase   정수용  정보보호학회지, v.32, no.4, pp.49-59
Conference
2022 A Study on Metaverse Security Threats   진승헌   한국정보보호학회 학술 대회 (하계) 2022, pp.699-702
Conference
2021 Major Issues and Implications for 20 Years of Accredited Certificate   진승헌   한국정보기술학회 종합 학술 대회 (추계) 2021, pp.16-20
Journal
2021 World Without Boundaries and Trends in User Authentication Technology   진승헌   전자통신동향분석, v.36, no.4, pp.135-144
Conference
2021 Analysis of Digital ID Management Technology Requirements for the Post-COVID-19 Er   진승헌   한국정보기술학회 종합 학술 대회 (하계) 2021, pp.24-28
Journal
2020 Trends of Digital Identity Technology   진승헌   주간기술동향, v.1975, pp.2-13
Journal
2020 Is Your Android App Insecure? Patching Security Functions With Dynamic Policy Based on a Java Reflection Technique   Sung-Hoon Lee   IEEE Access, v.8, pp.83248-83264 5
Journal
2019 Mobile Network Security Issues regarding 5G Security   박종근   전자통신동향분석, v.34, no.1, pp.36-48
Conference
2018 AppWrapper: Patching Security Functions with Dynamic Policy on Your Insecure Android Apps   Sung-Hoon Lee   International Symposium on Software Reliability Engineering Workshops (ISSREW) 2018, pp.36-41 2
Journal
2018 Detection of Spoofing Attacks in Face Recognition   이성훈   주간기술동향, v.1870, pp.17-26
Conference
2018 Learning based Biometric Key Generation Method using CNN and RNN   Jong-hyuk Roh   International Conference on Information Technology and Electrical Engineering (ICITEE) 2018, pp.136-139 12
Journal
2018 Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment   Sung-Hoon Lee   Journal of Information Processing Systems, v.14, no.2, pp.523-538 9
Journal
2018 Trends in Implicit Continuous Authentication Technology   김승현   전자통신동향분석, v.33, no.1, pp.57-67
Conference
2017 Appwrapping Providing Fine-Grained Security Policy Enforcement Per Method Unit in Android   Sung-Hoon Lee   International Symposium on Software Reliability Engineering Workshops (ISSREW) 2017, pp.36-39 4
Journal
2017 Constructing a Privacy-Protecting Fingerprint-Template Based on a Combination of Encryption   김형균   한국정보기술학회논문지, v.15, no.10, pp.45-53
Conference
2017 A Study of Adaptive Feature Subset for Improving Accuracy of Keystroke Dynamics Authentication on Mobile Environment   이성훈  한국정보처리학회 학술 발표 대회 (춘계) 2017, pp.287-290
Journal
2017 모바일 보안 관리 기술 소개 및 동향   이성훈   주간기술동향, v.1791, pp.2-12
Journal
2017 Simplified Small Exponent Test for Batch Verification   Jung Yeon Hwang   Theoretical Computer Science, v.662, pp.48-58 15
Conference
2016 A Study of App Wrapping for Repackaging Android Binary Application   이성훈   한국정보보호학회 학술 대회 (동계) 2016, pp.1-4
Conference
2016 Efficient Fuzzy Key Extraction Method with Lighted Template   김형균   한국정보보호학회 학술 대회 (동계) 2016, pp.1-4
Conference
2016 A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment   Sung-Hoon Lee   World Conference on Information Security Applications (WISA) 2016 (LNCS 10144), v.10144, pp.1-10 2
Journal
2016 핀테크 보안 기술 동향 : 상황 인지 기반 인증 기술   김승현   정보과학회지, v.34, no.4, pp.20-24
Conference
2015 Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures   Jung Yeon Hwang   International Conference on Security Standardisation Research (SSR) 2015, v.9497, pp.43-69 5
Journal
2015 Customer Data Scanner for Hands-Free Mobile Payment   SooHyung Kim   IEICE Transactions on Communications, v.E98-B, no.11, pp.2291-2299 0
Journal
2015 Study on Fintech Technology and Its Security   이성훈   전자통신동향분석, v.30, no.4, pp.110-119
Journal
2015 An Attack of Defeating Keyboard Encryption Module using Javascript Manipulation in Korean Internet Banking   이성훈   정보보호학회논문지, v.25, no.4, pp.941-950
Conference
2015 Accurate Indoor Proximity Zone Detection Based on Time Window and Frequency with Bluetooth Low Energy   Dae-Yeob Kim   International Conference on Mobile Systems and Pervasive Computing (MobiSPC) 2015, pp.88-95
Conference
2014 Risk of Personal Information for the Sale of Used Goods in the Online   박준범   한국정보처리학회 학술 발표 대회 (추계) 2014, pp.482-485
Journal
2014 Passwordless Authentication Technology-FIDO   조상래   전자통신동향분석, v.29, no.4, pp.101-109
Conference
2014 Implementation of TouchSign Certificate Management System   조상래   대한전자공학회 종합 학술 대회 (하계) 2014, pp.598-601
Conference
2014 The Research on iBeacon Technology Trend and Issue   김대엽   한국 컴퓨터 종합 학술 대회 2014, pp.390-392
Conference
2014 Implementation of TouchSign Online System   김수형   대한전자공학회 종합 학술 대회 (하계) 2014, pp.595-597
Conference
2014 Implementation of TouchSign Offline Digital Signature System   조영섭   대한전자공학회 종합 학술 대회 (하계) 2014, pp.602-605
Conference
2014 The Effective De-Identification using Quasi-Identifier in the Relational Database   박준범   한국정보보호학회 학술 대회 (하계) 2014, pp.1-4
Conference
2014 Device Control Protocol Using Mobile Phone   Jong-hyuk Roh   International Conference on Advanced Communication Technology (ICACT) 2014, pp.355-359 15
Journal
2013 A Method of Identifying Ownership of Personal Information Exposed in Social Network Service   김석현   정보보호학회논문지, v.23, no.6, pp.1103-1110
Conference
2013 A Method to Convert Formalized Hangul Name of Informal User Name   김석현   한국정보과학회 학술 발표회 (추계) 2013, pp.799-801
Conference
2013 Privacy Protection Technology for Public Information Open & Sharing   최대선   한국정보과학회 학술 발표회 (추계) 2013, pp.775-777
Conference
2013 Connecting Same ID in the Facebook and Twitter   박준범   한국정보과학회 학술 발표회 (추계) 2013, pp.778-780
Conference
2013 Named Entity Recognition with Automatically Gathered Training Data   조진만   한국정보과학회 학술 발표회 (추계) 2013, pp.772-774
Conference
2013 Geo-Location based QR-Code Authentication Scheme to Defeat Active Real-time Phishing Attack   Seung-Hyun Kim   Workshop on Digital Identity Management (DIM) 2013, pp.51-61 11
Journal
2013 Personal Information Exposure on Social Network Service   최대선   정보보호학회논문지, v.23, no.5, pp.977-983